+ All Categories
Home > Documents > WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS...

WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS...

Date post: 21-Dec-2015
Category:
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
16
WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY MANAGEMENT SCHEME Presented By: Mohammed Saleh CS 599a Fall06
Transcript

WIRELESS SENSOR NETWORK SECURITY USING GROUP KEY

MANAGEMENT SCHEME

Presented By:

Mohammed Saleh

CS 599a Fall06

WSNWSN

• Background• WSN Architecture• WSN Security Issues and requirements• Approach

BackgroundBackground

• 100/1000 nodes

• Low cost solution

• Limited resources

• Controlled or uncontrolled environment

WSN ArchitectureWSN Architecture

WSN ArchitectureWSN Architecture

A sensor Nodes Consist of:• Battery• Memory• Processor• Radio links for communicating

Sensor Node ConstraintsSensor Node Constraints

• Battery Power/Energy

• Processor

• Rechargeability

• Sleep PatternsMemory

Network constraintsNetwork constraints

• Limited Pre-Configuration

• Unreliable communications

• Frequent Routing Changes

WSN ArchitectureWSN Architecture

WSN ArchitectureWSN Architecture

Security in Wireless NetworksSecurity in Wireless Networks

Security RequirementsSecurity Requirements

• Confidentiality• Authenticity• Integrity• Freshness• Scalability• Availability• Accessibility• Self-Organization• Flexibility

Security in Wireless NetworksSecurity in Wireless Networks

• Attacks• Poor physical protection• Attacks not only from outside butalso from within the network fromcompromised nodes.

WSN AttacksWSN Attacks

Security in Wireless NetworksSecurity in Wireless Networks

Security concepts:

• Cryptography

- Public/private key

• Diffie hellman

Group key protocolGroup key protocol

• key establishment protocols can be classified into two categories:

• Group key management - Group key is usually created and updated by a central key server, and then securely

distributed to all members.

• Tree-based key management - each node contributes a fraction of the group key and the creation and update of group key are the joint work of all members.

Group Key MgmtGroup Key Mgmt


Recommended